1 |
Guofeng Lin, Hanshu Hong and Zhixin Sun. "A Collaborative key Management Protocol in ciphertext policy Attribute-Based encryption for Cloud Data Sharing," IEEE Acess. vol 5. pp. 9464-9475. May. 2017
DOI
|
2 |
KISIA, "Changes in the IT ecosystem, according to a spreading cloud services and Countermeasure," Korea IT Service Industry Association, 2012
|
3 |
Peter Mell and Timothy Grance. "The NIST Definition of Cloud Computing," NIST Special Publication 800-145, Sep. 2011
|
4 |
Sung-Jae Jung and Yu-Mi Bae, "Trend analysis of Threats and Technologies for Cloud Security," Journal of Security Engineering, 10(2), pp.199-212, April, 2013
|
5 |
Primoz Cigoj, Borka Jerman Blazie and Tomaz Klobucar. "an approach in the design of common authentication solution for a multi-platfotm cloud environment," 5th International Conference on Cloud Computing and Service Science. pp. 365-372. Jan. 2015
|
6 |
H. A. Dinesha and V. K. Agrawal, "Multi-level authentication technique for accessing cloud services," Computing, Communication and Applications (ICCCA), 2012 International Conference on, pp. 1-4, Feb, 2012
|
7 |
M. Green, S. Hohenberger and B. Waters, "Outsourcing the decryption of ABE ciphertexts," in Proc. USENIX Secur. Symp., pp. 34-40. Aug, 2011
|
8 |
Do-hyeon Choi and Jung-oh Park, "Multi-session authentication scheme for secure authentication and session management of cloud services environment," Journal of the Korea Institute of Information and Communication Engineering, Vol. 19, No. 9, pp. 2056-2063, Sep. 2015
DOI
|
9 |
R Charanya and M Armudhan, "Survey on Access Control Issues in Cloud Computing," Emerging Trends in Engineering, Technology and Science (ICETETS), International Conference on. pp.164-167, Feb. 2016
|
10 |
J. Bethencourt, A and Sahai, B.Waters, "Ciphertext-policy attributebased encryption," in Proc. IEEE Symp. Secur. Privacy, pp. 321-334, May. 2007
|
11 |
J. Hur, "Improving security and efciency in attribute-based data sharing," IEEE Trans. Knowl. Data Eng., Vol. 25, No. 10, pp. 2271-2282, Oct. 2013
DOI
|
12 |
Kevin Walsh and John Manferdelli, "Intra-Cloud and Inter-Cloud Authe ntication," Cloud Computing (CLOUD), IEEE 10th International Conference on. pp.1-8, Jun, 2017
|
13 |
Yannan Li, Young Yu, Geyong Min, Willy Susilo, Jianbing Ni and Kim-Kwang Raymond Choo, "Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems," IEEE Transactions on Dependable and Secure Computing, Journal of Latex Class Files, Vol. 14. No. 8, pp. 1-12, Aug. 2015
|